Abstract | ||
---|---|---|
The current Android sensor security model either allows only restrictive read access to sensitive sensors (e.g., an app can only read its own touch data) or requires special install-time permissions (e.g., to read microphone, camera, or GPS). Moreover, Android does not allow write access to any of the sensors. Sensing-based security and non-security applications, therefore, crucially rely upon the... |
Year | DOI | Venue |
---|---|---|
2017 | 10.1109/TIFS.2016.2620278 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Smart phones,Androids,Humanoid robots,Security,Cameras,Linux,Microphones | Permission,Authentication,Android (operating system),Computer security,Computer science,Touchscreen,Exploit,Computer security model,The Internet,Debugging | Journal |
Volume | Issue | ISSN |
12 | 4 | 1556-6013 |
Citations | PageRank | References |
3 | 0.40 | 27 |
Authors | ||
3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Manar Mohamed | 1 | 49 | 5.90 |
Babins Shrestha | 2 | 83 | 6.83 |
Nitesh Saxena | 3 | 1204 | 82.45 |